I'm working for my owner, who can be reached
at security-basics-owner (at) securityfocus (dot) com. [email concealed]

I'm sorry, the list moderators for the security-basics list
have failed to act on your post. Thus, I'm returning it to you.
If you feel that this is in error, please repost the message
or contact a list moderator directly.

I'm working for my owner, who can be reached
at security-basics-owner (at) securityfocus (dot) com. [email concealed]

I'm sorry, the list moderators for the security-basics list
have failed to act on your post. Thus, I'm returning it to you.
If you feel that this is in error, please repost the message
or contact a list moderator directly.

On 10/11/2013 09:02 AM, Techfrog wrote:
> If they're good enough and want to get by you they're going too.
Wireshark is a great too, but if the data stream is encrypted your not
going to see much.
>
> Sent from my iPhone
>

Thank you. Mainly I was looking for traffic going to weird places.

>> On Oct 10, 2013, at 11:11 PM, ToddAndMargo <ToddAndMargo (at) zoho (dot) com [email concealed]>
wrote:
>>
>> Hi All,
>>
>> Since I sell Kaspersky and have had a lot of customers
>> on it for years, I have learned that if something gets
>> by Kaspersky, it is going to be a wild ride getting rid
>> of it. (I get rid of them manually and/or run other
>> vendors stuff at the computer.)
>>
>> Now a days, when I walk up to a protected computer,
>> my thoughts are "maybe". Did something get past that is not
>> being detected?
>>
>> Now I am thinking that a well crafted bad guy is
>> going to get past "penetration testing" (PEN). Although
>> find anything like this is not the scope of PEN
>> testing, I am still thinking it would be ethical
>> to see if any traffic is sneak out that is not suppose
>> to be.
>>
>> So I was thinking that I should turn off all network
>> traffic producing programs I know of on the POS computer,
>> and just sit watching its outgoing traffic to make
>> sure there is no bad guy Command and Control going on.
>> Does this make sense to you?
>>
>> Is Wireshark the proper tool for this?
>>
>> Your thoughts always appreciated.
>>
>> -T

Securing Apache Web Server with thawte Digital Certificate
In this guide we examine the importance of Apache-SSL and who needs an SSL certificate. We look at how SSL works, how it benefits your company and how your customers can tell if a site is secure. You will find out how to test, purchase, install and use a thawte Digital Certificate on your Apache web server. Throughout, best practices for set-up are highlighted to help you ensure efficient ongoing management of your encryption keys and digital certificates.